Featured Posts
Wednesday, 23 January 2013
Wednesday, 20 June 2012
Practicing safe hex (Antivirus)
No, it doesn’t involve witches’ incantations (though
some people see hexadecimal code as magic). It’s just a geeky way of saying
that you need to use your computer safely and responsibly, even if you already
have some defensive capabilities such as antivirus programs. As it happens, some
safe-hex practices can also help you differentiate a Trojan horse from a
legitimate message. Here’s a checklist of basic pointers:
Monday, 21 May 2012
The Origins of Antivirus Tools
In 1991, Symantec released the
first version of Norton AntiVirus. Norton was a popular brand name among
computer technophiles from the well-known and successful Norton Utilities
program. Programs like Norton AntiVirus are designed to find and eliminate
viruses from a computer, usually with three goals in mind:
_ Make the virus stop doing harm
to the computer it has infected
_ Stop the spread of the virus
_ Limit any further harm the
virus can do
The People Who Write Viruses
Sometimes I think that it helps
to understand a little bit more about the people who perpetrate crimes, in
order to be able to avoid being a victim of those crimes. Others of you may
just have a morbid curiosity about those who like to hurt other people. Either
way, you’ll learn a little more about the people who construct the malicious
programs that cause billions of dollars of damage each year.
Why they write ’em
The actual crime of writing and
distributing viruses is a crime of anonymity: The perpetrators usually carry
out their crimes anonymously, from the safety of their rooms. They expect never
to meet their victims face to face — in fact, they rarely know who their
victims are.
Friday, 11 May 2012
How Early Viruses Spread from Computer to Computer
In the mid-to-late 1980s, data was most often transferred
from computer to computer by using floppy disks and so-called bulletin board
systems (BBSs), managed online locations that were the forerunners of today’s
Web sites.
Stowing
away on floppy disks
Even without using the Internet, people in offices where PCs were used
traded and circulated programs, documents, and spreadsheets — not to mention
jokes, games, filthy pictures, and so forth. The standard method was sneaker
net — walking up to another person and handing over a floppy disk.
Friday, 27 April 2012
Invasion of the Computer Viruses
Simply stated, a computer virus is a computer
program written by a person (not always, but usually, a jerk) who
designed it to spread to as many computers as possible.
This definition seems simple enough, but
indulges me. I’d like to zero in a bit further, to clarify some issues and to
dispel some misunderstandings:
Computer program: A virus is nothing more than a set of instructions,
written in a high-level programming language, such as Visual Basic, C, C++, or
Java, translated into “native” instructions (a long list of ones and zeros) that
are used by the computer’s CPU.
Friday, 3 February 2012
First Computer Virus (Brain, the first virus)
In
Pakistan, Basit Farooq Alvi and Amjad Farooq Alvi ran a computer store called
Brain Computer Services.
They
soon discovered that a floppy disk contained computer instructions that were
executed when the computer was first turned on. Basit and Amjad used this
knowledge for their own purposes and created computer instructions that would
change the label of floppy disks in the computer to (C) Brain. The instructions
would make a copy of themselves onto other floppy disks that were inserted into
the floppy-disk drive.
Friday, 27 January 2012
China Emerging SuperPower 21st Century
Is China Emerging Superpower
in the 21st Century?
American economy is really in bad shape. About 1.2 million people have
lost their jobs during the last 2 years economic meltdown. The unemployment
rate has gone up to 11%. America is presently the most highly indebted country
in the world. With total loans of about 17 trillion dollars, china is the
biggest single lender having a share of about $ one trillion. It is estimated
that USA would add another 7 Trillion dollars to it burden of debits during the
next five years to meet its budget deficits. Street demonstrations with banners
and play cards such as “we have been fighting Iraq and afghan war with borrowed
money, is unjustified and unwinnable war” stop plying world policeman role and
concentrate on your economy and wellbeing of the people are on the rise. This
shows the public mood and disapproval of their government policies.
How to Installing Symantec Endpoint Protection 12.0 for Windows
Step-by-step
instructions on how to install Symantec Endpoint Protection for Windows.
Symantec Endpoint Protection
Setup Manual
If there is other antivirus software they should be
uninstalled before installing Symantec EndPoint Protection Software. Otherwise,
Different Antivirus software can detect definition files of other software as a
threat that can create some problems.
First of all if you have Zip file. Extract it now as showing
you in listing
Saturday, 14 January 2012
China's Economy Growth Policy
China, the third largest country in the world, is famous for various things;
it has one of the world eldest people, civilization, and world’s longest used
written languages, many major inventions like paper, compass, gunpowder and
printing, The Great wall of china, friendly people, and the best geographical
condition. China situates in the eastern Asia which share it borders with Korea
Afghanistan, Pakistan, India, Nepal, Sikkim, Bhutan, Burma, Laos and Vietnam.
Major cities of china are Beijing, Chengdu, Hong Kong, Lhasa, pingyao,
shanghai, Xian, yangshuao, and Urumqi, Suzhou and many others.
Subscribe to:
Posts (Atom)